Information Security
Information Security
Table of Contents
Information security ................................................................................................................................. 2
Attacks and Vulnerabilities ...................................................................................................................... 2
SPAMMING ............................................................................................................................................... 3
VIRUSES .................................................................................................................................................... 3
DENIAL OF SERVICE ATTACKS .................................................................................................................. 3
PASSWORD GUESSING ............................................................................................................................. 3
WORMS..................................................................................................................................................... 4
BACKDOOR ............................................................................................................................................... 4
SWEEPER ................................................................................................................................................... 4
SNIFFERS ................................................................................................................................................... 4
PACKET ...................................................................................................................................................... 4
IP ............................................................................................................................................................... 4
TROJAN HORSES ....................................................................................................................................... 5
Anatomy of an Attack .............................................................................................................................. 5
Awareness and Management Commitment to Security ......................................................................... 6
Security Policy .......................................................................................................................................... 7
Define Security Policy............................................................................................................................... 8
Confidentiality .......................................................................................................................................... 8
Integrity .................................................................................................................................................... 8
Availability ................................................................................................................................................ 9
Accountability........................................................................................................................................... 9
Assurance.................................................................................................................................................. 9
Enforcement ............................................................................................................................................. 9
Create Plan for Security Policy ............................................................................................................... 10
INFOSEC Network Architecture Design Rules........................................................................................ 10
Physical Separation 1. Restrict access: .................................................................................................. 11
2. Single network segment..................................................................................................................... 11
3. Use a switch ........................................................................................................................................ 11
5.2 LOGICAL SEPARATION ...................................................................................................................... 12
Logical Network Separation: .................................................................................................................. 12
5.3 FIREWALL ARCHITECTURE ................................................................................................................ 13
2
Information security
Information Security requirements have changed in recent times
Traditionally provided by physical and administrative mechanisms
Computer use requires automated tools to protect files and other stored information
Use of networks and communications links requires measures to protect data during
transmission
Computer Security - generic name for the collection of tools designed to protect
data and to thwart hackers
Network Security - measures to protect data during their transmission
Internet Security - measures to protect data during their transmission over a
collection of interconnected networks
Information Security: the state of being protected against the unauthorized use of
information, especially electronic data, or the measures taken to achieve this.
our focus is on Information Security
which consists of measures to deter, prevent, detect, and correct security
violations that involve the transmission & storage of information
Attacks and Vulnerabilities
any action that compromises the security of information owned by an
organization
information security is about how to prevent attacks, or failing that, to detect
attacks on information-based systems
often threat & attack used to mean same thing
have a wide range of attacks
can focus of generic types of attacks
3
passive
active
SPAMMING
Spamming consists of an identified or unidentified source sending bulk mail to
your site.
In the nonmalicious form it consists of sending bulk advertising mail to many
accounts at your site consistently, even multiple times a day.
In the malicious form (e.g., email bombing) it consists of an attacker sending
bulk mail until your mail server runs out of disk space.
This type of attack consumes part or all of the communications bandwidth to your
site and attempts to deny service to your mail server by keeping it busy and filling
up its disk space.
VIRUSES
Computer viruses are compact packages of software that require a host (i.e., the
computer) in order to replicate and possibly cause damage.
Viruses can attack any part of a computer’s software such as its boot block,
operating system, file allocation (FAT) tables, EXE files, COM files and
application program macros.
Boot block viruses replace the boot block with virus code and relocate it to
another disk location where data may be overwritten at that location.
EXE and COM file viruses insert or append the virus code into these files
DENIAL OF SERVICE ATTACKS
Denial of service – Prevents or inhibits the normal use or management of
communication facilities. Another form of service denial is the disruption of an entire
network, either by disabling the network or overloading it with messages so as to
degrade performance. It is quite difficult to prevent active attacks absolutely, because to
do so would require physical protection of all communication facilities and paths at all
times. Instead, the goal is to detect them and to recover from any disruption or delays
caused by them.
PASSWORD GUESSING
Most hackers gain illegal entry into remote computer systems by guessing
passwords.
It is surprising that so many system accounts have weak passwords. Most
hackers gain access by guessing people’s passwords using common names or
combinations of letters.
Also, password generation programs are commonly used that create passwords,
usually a dictionary word, to try to gain access.
4
A SYN flood attack is a form of internet protocol (IP) spoofing that exploits the
three-way handshake in the TCP/IP protocol that initiates every IP connection.
This form of attack allows a hacker to fake his identity by sending SYN packets
with a spoofed source address to a destination host.
The destination host sends a SYN-ACK packet to the unsuspecting host with the
spoofed address.
The destination host waits 5 1 Meinel, C., “How Hackers Break In…”, Scientific
American, October 1998, pp. 98-105. for an ACK until there is a time-out.
The destination machine connection buffer fills with incomplete connections until
it stops accepting new connections.
In another variation of this type of attack, the hacker probes a computer’s ports.
When an active port is found, the hacker sends multiple SYN packets to discover
the sequence numbers of returning ACK/SYN packets.
Another SYN packet that impersonates a trusted computer is sent by the hacker
followed by an ACK with the correct sequence number, thus establishing a
connection to the computer.
The computer will transmit information to the hacker since it believes the
connection is to a trusted host1 .
TROJAN HORSES
Trojan horses are software codes that enter the computer system through the
front door.
This type of software is embedded in a program or utility that the user believes to
be harmless, such as a text editor or useful utility program.
These programs are obtained voluntarily by the user to help with some task or
problem.
When the program is used, it then performs some malicious function such as
deleting or copying files to another computer
Anatomy of an Attack
This section provides an example of how a hacker might discover information
and gain access to a network
An attack on your system can come from either inside or outside your
organization.
Protecting your systems only from external attack may be a fatal flaw in your
security
policy.
6
Most attacks, however, do come from the outside by either experienced hackers
or inexperienced, newly budding hackers and take place during the night when
risk of detection is low.
Describing this process should enlighten the reader to the clever methods that
may be employed by a hacker to gain access to your systems and network.
Awareness and Management
Commitment to Security
The first step in implementing information security is to create a security policy.
Before creating a security policy, however, an organization’s management must
consider arguments for the security risks: how security breaches may impact
business, such as the reputation of the company if it is hacked (negative
publicity), and the potential financial risk that is at stake.
Also, some businesses, such as healthcare, will need to implement information
security because it is required by law.
If the risks to the organization are not perceived as high, or are not believable,
then you will not be able to effectively enforce or maintain your security policy.
Much of the time management is simply not aware of the risks or does not fully
understand them. They may not believe the organization is vulnerable to attack
for some reason.
Managers of small companies, for example, tend to downplay security risks.
I have found a general lack of management awareness of security risks at all
levels and types of organizations.
Security at best is perceived as a necessary evil and at worst is seen as a costly
and undesirable intrusion.
It must be seen as an integral part of an organization’s overall business strategy.
Security risks must be translated in the minds of managers to financial loss,
either through lost business, reduced productivity, lost data, revealed corporate
secrets or compromised integrity.
The threat by hackers must be perceived as real.
Examples of recent hacker attacks on similar organizations may need to be
presented to management, to get their attention.
If management does not agree to establish and enforce a security policy, then
your enhancements to security may not stop your high-risk threats.
The high-risk threats and the cost of mitigating these threats must be presented
accurately and fully.
Only then can management make a good decision.
7
Since management may need to be educated as to the reality of the threat and
its impact on the organization, the most potent argument is to clearly define the
financial risks.
It may be necessary to hire a third party to do the vulnerability analysis, as this
often
has a stronger impact with management.
Security Policy
Establishing a security policy is the starting point in designing a secure computer
network.
It is essential that a set of minimum security requirements be gathered,
formalized and included as the basis of your security policy.
This security policy must be enforceable by your organization and will create an
additional cost to running and monitoring your network.
This additional cost/benefit of a security policy must be understood and
embraced by your organization’s management in order to enhance and maintain
network and system security.
The lack of an accepted and well-thought-out security policy and guidelines
document is one of the major security vulnerabilities in most companies today.
This section discusses several Best Practices related to the production of such a
document.
In addition, a generic security policy is provided in Appendix B and also on the
accompanying CDROM.
The importance of a meaningful security policy cannot be overemphasized.
Perform a threat analysis and risk analysis for your organization to determine the
level of security that must be implemented.
First, identify all the threats to your computers and network;
second, determine threat categories;
third, perform the risk assessment; and,
fourth, recommend action.
Risk assessment should be performed by constructing a “consequence” matrix
vs. “likelihood” matrix3 as shown in
Figure 4-1.
8
Physical Separation
1. Restrict access:
Restrict access between separate physical networks via a filtering router.
A filtering router must be used to restrict access between network segments.
Filtering routers or packet-screening routers control the flow of IP packets
between two or more network segments based on a set of rules as shown in
Figure 5-1.
A filtering router has the ability to filter IP traffic using filtering rules.
3. Use a switch
Use a switch to isolate traffic between servers, groups of users, and
departments.
Use a switch to separate traffic between servers and departments within an
organization in order to prevent the unnecessary flow of network traffic
throughout an organization.
12
takes O((log n)3 ) operations · its security relies on the difficulty of calculating factors of
large numbers o nb factorization takes O(e log n log log n) operations o (same as for
discrete logarithms) · the algorithm is patented in North America (although algorithms
cannot be patented elsewhere in the world) o this is a source of legal difficulties in using
the scheme · RSA is a public key encryption algorithm based on exponentiation using
modular arithmetic · to use the scheme, first generate keys: · Key-Generation by each
user consists of: o selecting two large primes at random (~100 digit), p, q o calculating
the system modulus R=p.q p, q primes o selecting at random the encryption key e, o e <
R, gcd(e, F(R)) = 1 o solving the congruence to find the decryption key d, o e.d
[[equivalence]] 1 mod [[phi]](R) 0 <= d <= R o publishing the public encryption key:
K1={e,R} o securing the private decryption key: K2={d,p,q} · Encryption of a message M
to obtain ciphertext C is: · C = Me mod R 0 <= d <= R · Decryption of a ciphertext C to
recover the message M is: o M = Cd = Me.d = M1+n.[[phi]](R) = M mod R · the RSA
system is based on the following result: if R = pq where p, q are distinct large primes
then X [[phi]](R) = 1 mod R for all x not divisible by p or q and [[Phi]](R) = (p-1)(q-1)
RSA Example ·
usually the encryption key e is a small number, which must be relatively prime to
[[phi]](R) (ie GCD(e, [[phi]](R)) = 1) ·
typically e may be the same for all users (provided certain precautions are taken), 3 is
suggested ·
the decryption key d is found by solving the congruence:
e.d [[equivalence]] 1 mod [[phi]](R), 0 <= d <= R, ·
an extended Euclid's GCD or Binary GCD calculation is done to do this.
given e=3, R=11*47=517, [[phi]](R)=10*46=460
then d=Inverse(3,460) by Euclid's alg:
iyguv
0 - 460 1 0
1-301
2 153 1 1 -153
3 3 0 -3 460
ie: d = -153, or 307 mod 517 ·
a sample RSA encryption/decryption calculation is:
M = 26 C = 263 mod 517 = 515 M = 515307 mod 517 = 26